Actions

Special

Short pages

Showing below up to 500 results in range #1 to #500.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎Work Specialization ‎[653 bytes]
  2. (hist) ‎Decentralization ‎[666 bytes]
  3. (hist) ‎Earned Schedule (ES) ‎[668 bytes]
  4. (hist) ‎Charismatic Leadership ‎[673 bytes]
  5. (hist) ‎Leadership Development Framework ‎[673 bytes]
  6. (hist) ‎Intrusion Detection Prevention (IDS) ‎[679 bytes]
  7. (hist) ‎Query ‎[679 bytes]
  8. (hist) ‎Cross-Cultural Leadership ‎[684 bytes]
  9. (hist) ‎Cost Allocation ‎[687 bytes]
  10. (hist) ‎Background Process ‎[699 bytes]
  11. (hist) ‎Data Storage ‎[701 bytes]
  12. (hist) ‎Competitive Pricing ‎[703 bytes]
  13. (hist) ‎Alternative Delivery Models ‎[705 bytes]
  14. (hist) ‎Theory of Inventive Problem Solving ‎[705 bytes]
  15. (hist) ‎Common Lisp Object System (CLOS) ‎[707 bytes]
  16. (hist) ‎Performance Goal ‎[708 bytes]
  17. (hist) ‎Two Factor Theory ‎[709 bytes]
  18. (hist) ‎Switch Framework ‎[710 bytes]
  19. (hist) ‎Incident ‎[712 bytes]
  20. (hist) ‎Organizational Health Index (OHI) ‎[713 bytes]
  21. (hist) ‎CIO Wiki:Privacy policy ‎[715 bytes]
  22. (hist) ‎Mass Customization ‎[716 bytes]
  23. (hist) ‎Electronic Data Processing (EDP) ‎[716 bytes]
  24. (hist) ‎Task Management ‎[718 bytes]
  25. (hist) ‎Attribution ‎[719 bytes]
  26. (hist) ‎Investment Management Lifecycle ‎[720 bytes]
  27. (hist) ‎Asymmetric Digital Subscriber Line (ADSL) ‎[721 bytes]
  28. (hist) ‎Advanced Manufacturing ‎[722 bytes]
  29. (hist) ‎Business Process Specification Schema (BPSS) ‎[723 bytes]
  30. (hist) ‎Software Architecture Analysis Method (SAAM) ‎[724 bytes]
  31. (hist) ‎Closed Source Software ‎[728 bytes]
  32. (hist) ‎Business Process Analytics ‎[733 bytes]
  33. (hist) ‎Run time (Program Lifecycle Phase) ‎[733 bytes]
  34. (hist) ‎Team Leadership ‎[744 bytes]
  35. (hist) ‎Vocabulary of Interlinked Datasets (VoID) ‎[745 bytes]
  36. (hist) ‎Intelligent Process Automation (IPA) ‎[748 bytes]
  37. (hist) ‎Brand Value ‎[750 bytes]
  38. (hist) ‎Component-Based Development (CBD) ‎[754 bytes]
  39. (hist) ‎Shareholder Theory ‎[754 bytes]
  40. (hist) ‎Delphi Method ‎[755 bytes]
  41. (hist) ‎Feedforward Neural Network ‎[755 bytes]
  42. (hist) ‎Behavioral Pattern ‎[757 bytes]
  43. (hist) ‎Cost Justification ‎[760 bytes]
  44. (hist) ‎Vital Business Function (VBF) ‎[767 bytes]
  45. (hist) ‎Consumer Confidence ‎[770 bytes]
  46. (hist) ‎Object Oriented Modeling (OOM) ‎[774 bytes]
  47. (hist) ‎Control Activities ‎[779 bytes]
  48. (hist) ‎Facilitative Leadership ‎[785 bytes]
  49. (hist) ‎Economic Capital (ECAP) ‎[792 bytes]
  50. (hist) ‎Stewardship Theory ‎[796 bytes]
  51. (hist) ‎Business Process Query Language (BPQL) ‎[799 bytes]
  52. (hist) ‎Democratic Leadership ‎[802 bytes]
  53. (hist) ‎Business Process Analysis ‎[802 bytes]
  54. (hist) ‎Operational Analytics ‎[804 bytes]
  55. (hist) ‎Value Risk Matrix (VRM) ‎[813 bytes]
  56. (hist) ‎Innovation Economics ‎[814 bytes]
  57. (hist) ‎Application Infrastructure Suite (AIS) ‎[815 bytes]
  58. (hist) ‎General Systems Theory (GST) ‎[816 bytes]
  59. (hist) ‎Analytic Hierarchy Process Framework (AHP) ‎[832 bytes]
  60. (hist) ‎Managed Service Provider (MSP) ‎[832 bytes]
  61. (hist) ‎The N7 and 7MP Tools ‎[836 bytes]
  62. (hist) ‎RCSA (Risk Control Self Assessment) ‎[838 bytes]
  63. (hist) ‎Service Request ‎[840 bytes]
  64. (hist) ‎Transactional Leadership ‎[850 bytes]
  65. (hist) ‎Universal Strategy Formulation Model (USFM) ‎[854 bytes]
  66. (hist) ‎Workflow ‎[869 bytes]
  67. (hist) ‎Empirical Method ‎[870 bytes]
  68. (hist) ‎Authentication ‎[871 bytes]
  69. (hist) ‎ITIL Service Value Chain (SVC) ‎[871 bytes]
  70. (hist) ‎Commercial off-the-shelf (COTS) ‎[874 bytes]
  71. (hist) ‎Lewin/Schein's Change Theory ‎[874 bytes]
  72. (hist) ‎Attribution Theory ‎[879 bytes]
  73. (hist) ‎Computer Architecture ‎[879 bytes]
  74. (hist) ‎Quality Management Maturity Grid (QMMG) ‎[879 bytes]
  75. (hist) ‎Object Modeling Technique (OMT) ‎[880 bytes]
  76. (hist) ‎Top-Level Domain (TLD) ‎[885 bytes]
  77. (hist) ‎Applied Analytics ‎[886 bytes]
  78. (hist) ‎Procedure Manual ‎[889 bytes]
  79. (hist) ‎DIKW Pyramid ‎[890 bytes]
  80. (hist) ‎Wi-Fi Network ‎[891 bytes]
  81. (hist) ‎Compensation ‎[893 bytes]
  82. (hist) ‎Enterprise Release Management (ERM) ‎[893 bytes]
  83. (hist) ‎Causal Ambiguity ‎[895 bytes]
  84. (hist) ‎Commodity Computing ‎[898 bytes]
  85. (hist) ‎Variable Costs ‎[899 bytes]
  86. (hist) ‎Application Lifecycle Framework ‎[900 bytes]
  87. (hist) ‎Kano Model ‎[902 bytes]
  88. (hist) ‎Flexible Organization ‎[903 bytes]
  89. (hist) ‎Procedure ‎[905 bytes]
  90. (hist) ‎ArchiMate ‎[912 bytes]
  91. (hist) ‎Art of War ‎[915 bytes]
  92. (hist) ‎Rapid Economic Justification (REJ™) ‎[915 bytes]
  93. (hist) ‎.MDB File Format ‎[916 bytes]
  94. (hist) ‎Standard Cost Pricing ‎[916 bytes]
  95. (hist) ‎Plesiochronous Digital Hierarchy (PDH) ‎[916 bytes]
  96. (hist) ‎Simple Network Management Protocol (SNMP) ‎[918 bytes]
  97. (hist) ‎Operational Support Services (OSS) ‎[918 bytes]
  98. (hist) ‎.NET Enterprise Server ‎[919 bytes]
  99. (hist) ‎Autocratic Leadership ‎[923 bytes]
  100. (hist) ‎Website Wireframe ‎[932 bytes]
  101. (hist) ‎Service-Based Costing ‎[933 bytes]
  102. (hist) ‎Tangible Book Value ‎[937 bytes]
  103. (hist) ‎Requirement ‎[938 bytes]
  104. (hist) ‎Cascading Style Sheet (CSS) ‎[945 bytes]
  105. (hist) ‎Reservoir Approach ‎[945 bytes]
  106. (hist) ‎3D Modeling ‎[946 bytes]
  107. (hist) ‎Boil the Ocean ‎[949 bytes]
  108. (hist) ‎SCOR (Supply Chain Operations Reference Model) ‎[954 bytes]
  109. (hist) ‎IP Network ‎[955 bytes]
  110. (hist) ‎Yottabyte ‎[956 bytes]
  111. (hist) ‎Usability ‎[961 bytes]
  112. (hist) ‎Audio Messaging Interchange Specification (AMIS) ‎[962 bytes]
  113. (hist) ‎Intrusion Prevention System (IPS) ‎[963 bytes]
  114. (hist) ‎Asset Liability Management (ALM) ‎[964 bytes]
  115. (hist) ‎Blind Spot Analysis ‎[966 bytes]
  116. (hist) ‎Strategic Priorities ‎[966 bytes]
  117. (hist) ‎Organogram ‎[967 bytes]
  118. (hist) ‎Zeta Architecture ‎[970 bytes]
  119. (hist) ‎Barriers to Entry ‎[971 bytes]
  120. (hist) ‎Adaptive Control ‎[974 bytes]
  121. (hist) ‎Business Process Discovery ‎[975 bytes]
  122. (hist) ‎Five Whys ‎[986 bytes]
  123. (hist) ‎Product Personalization ‎[990 bytes]
  124. (hist) ‎Minimum Viable Product (MVP) ‎[995 bytes]
  125. (hist) ‎Workflow Reference Model ‎[1,000 bytes]
  126. (hist) ‎People, Process, Technology Framework ‎[1,002 bytes]
  127. (hist) ‎Internal Systems ‎[1,002 bytes]
  128. (hist) ‎Audit Trail ‎[1,005 bytes]
  129. (hist) ‎Financial Services Function Model (FSFM) ‎[1,008 bytes]
  130. (hist) ‎Bottom of the Pyramid (BOP) ‎[1,009 bytes]
  131. (hist) ‎Deliverable ‎[1,009 bytes]
  132. (hist) ‎Baseline ‎[1,010 bytes]
  133. (hist) ‎Binary Code ‎[1,017 bytes]
  134. (hist) ‎Application Service Provider (ASP) ‎[1,019 bytes]
  135. (hist) ‎Transition Methodology ‎[1,019 bytes]
  136. (hist) ‎Binary Digit (Bit) ‎[1,021 bytes]
  137. (hist) ‎Single Customer View ‎[1,026 bytes]
  138. (hist) ‎Box-Jenkins Method ‎[1,027 bytes]
  139. (hist) ‎Solutions Provider ‎[1,027 bytes]
  140. (hist) ‎Gartner Score ‎[1,029 bytes]
  141. (hist) ‎Yield to Maturity ‎[1,030 bytes]
  142. (hist) ‎Working Capital ‎[1,034 bytes]
  143. (hist) ‎Bitcoin ‎[1,041 bytes]
  144. (hist) ‎Guard Dog Theory ‎[1,041 bytes]
  145. (hist) ‎Web Development ‎[1,042 bytes]
  146. (hist) ‎Backbone ‎[1,043 bytes]
  147. (hist) ‎Nanotechnology ‎[1,043 bytes]
  148. (hist) ‎Application Sharing ‎[1,049 bytes]
  149. (hist) ‎ICT4D (Information and Communication Technologies for Development) ‎[1,049 bytes]
  150. (hist) ‎Unique Selling Proposition ‎[1,051 bytes]
  151. (hist) ‎Pricing ‎[1,052 bytes]
  152. (hist) ‎Restructuring ‎[1,054 bytes]
  153. (hist) ‎Business Process Maturity Model (BPMM) ‎[1,054 bytes]
  154. (hist) ‎Cyber Attack ‎[1,056 bytes]
  155. (hist) ‎Dashboard ‎[1,057 bytes]
  156. (hist) ‎Level 5 Leadership ‎[1,059 bytes]
  157. (hist) ‎Context of Use (CoU) Analysis ‎[1,061 bytes]
  158. (hist) ‎Average Rate of Return ‎[1,065 bytes]
  159. (hist) ‎White Knight ‎[1,065 bytes]
  160. (hist) ‎Basel Committee on Banking Supervision ‎[1,066 bytes]
  161. (hist) ‎Consulting Services ‎[1,066 bytes]
  162. (hist) ‎Guideline ‎[1,067 bytes]
  163. (hist) ‎Available to Promise (ATP) ‎[1,068 bytes]
  164. (hist) ‎Project ‎[1,068 bytes]
  165. (hist) ‎Heart Framework ‎[1,069 bytes]
  166. (hist) ‎Mergers and Acquisitions (M&A) ‎[1,071 bytes]
  167. (hist) ‎Organizational Flexibility ‎[1,073 bytes]
  168. (hist) ‎The Open Information Systems Management Maturity Model (O-ISM3) ‎[1,075 bytes]
  169. (hist) ‎SHARP (Structured, Holistic Approach for a Research Proposal) ‎[1,077 bytes]
  170. (hist) ‎Broad Network Access ‎[1,079 bytes]
  171. (hist) ‎Information Governance Reference Model (IGRM) ‎[1,080 bytes]
  172. (hist) ‎Perceived Value Pricing ‎[1,080 bytes]
  173. (hist) ‎Attrition ‎[1,081 bytes]
  174. (hist) ‎Smart Information Systems (SIS) ‎[1,081 bytes]
  175. (hist) ‎Book Value ‎[1,085 bytes]
  176. (hist) ‎Data Enrichment ‎[1,088 bytes]
  177. (hist) ‎Supplier Value ‎[1,088 bytes]
  178. (hist) ‎Design of Experiments ‎[1,090 bytes]
  179. (hist) ‎Interaction Technique ‎[1,095 bytes]
  180. (hist) ‎Financial Services Workflow Model (FSWM) ‎[1,095 bytes]
  181. (hist) ‎Asset Liability Modeling ‎[1,098 bytes]
  182. (hist) ‎Assets Held For Sale ‎[1,100 bytes]
  183. (hist) ‎Globalization Management System (GMS) ‎[1,101 bytes]
  184. (hist) ‎Preferred Stock ‎[1,102 bytes]
  185. (hist) ‎Background Intelligent Transfer Service (BITS) ‎[1,104 bytes]
  186. (hist) ‎Standard Generalized Markup Language (SGML) ‎[1,104 bytes]
  187. (hist) ‎Mobile Network ‎[1,104 bytes]
  188. (hist) ‎Semantic Data Modeling ‎[1,106 bytes]
  189. (hist) ‎Porter's 3 Generic Strategies ‎[1,107 bytes]
  190. (hist) ‎Service Integration and Management (SIAM) ‎[1,108 bytes]
  191. (hist) ‎Year 2000 (Y2K) ‎[1,109 bytes]
  192. (hist) ‎Design Tool ‎[1,110 bytes]
  193. (hist) ‎Cloud Manufacturing ‎[1,113 bytes]
  194. (hist) ‎Shareholder ‎[1,113 bytes]
  195. (hist) ‎Fiber to the Home (FTTH) ‎[1,114 bytes]
  196. (hist) ‎Viable System Model (VSM) ‎[1,115 bytes]
  197. (hist) ‎Backward Integration ‎[1,116 bytes]
  198. (hist) ‎Wireless LAN ‎[1,116 bytes]
  199. (hist) ‎Branded Content Management ‎[1,117 bytes]
  200. (hist) ‎Z-Score ‎[1,121 bytes]
  201. (hist) ‎Programmable Logic Controller (PLC) ‎[1,122 bytes]
  202. (hist) ‎SOA Governance ‎[1,123 bytes]
  203. (hist) ‎Current Good Manufacturing Practice (cGMP) ‎[1,124 bytes]
  204. (hist) ‎Security Policy ‎[1,125 bytes]
  205. (hist) ‎Autoregressive Integrated Moving Average (ARIMA) Model ‎[1,128 bytes]
  206. (hist) ‎Financing ‎[1,131 bytes]
  207. (hist) ‎Browser Hijacking ‎[1,132 bytes]
  208. (hist) ‎Target Market ‎[1,132 bytes]
  209. (hist) ‎Average Cost Pricing ‎[1,134 bytes]
  210. (hist) ‎Back-End Plan ‎[1,137 bytes]
  211. (hist) ‎Performance Metrics ‎[1,137 bytes]
  212. (hist) ‎Swim Lane Diagram ‎[1,140 bytes]
  213. (hist) ‎IP Address ‎[1,142 bytes]
  214. (hist) ‎Backup Server ‎[1,144 bytes]
  215. (hist) ‎Microblogging ‎[1,144 bytes]
  216. (hist) ‎Network News Transfer Protocol (NNTP) ‎[1,145 bytes]
  217. (hist) ‎Internet Privacy ‎[1,146 bytes]
  218. (hist) ‎Mobile Platform as a Service (mPaaS) ‎[1,147 bytes]
  219. (hist) ‎Crown Jewel Defense ‎[1,149 bytes]
  220. (hist) ‎Swivel Chair Interface ‎[1,150 bytes]
  221. (hist) ‎Relational Capital ‎[1,151 bytes]
  222. (hist) ‎Virtual Machine Manager (VMM) ‎[1,153 bytes]
  223. (hist) ‎Smart Device ‎[1,153 bytes]
  224. (hist) ‎Shared Services ‎[1,153 bytes]
  225. (hist) ‎Identity Theft ‎[1,156 bytes]
  226. (hist) ‎Binomial Option Pricing Model ‎[1,157 bytes]
  227. (hist) ‎Bait and Switch ‎[1,159 bytes]
  228. (hist) ‎Hadoop ‎[1,159 bytes]
  229. (hist) ‎Data Integrity ‎[1,160 bytes]
  230. (hist) ‎Template ‎[1,162 bytes]
  231. (hist) ‎Back-End ‎[1,165 bytes]
  232. (hist) ‎Extended Enterprise ‎[1,166 bytes]
  233. (hist) ‎Hypertext Transfer Protocol (HTTP) ‎[1,167 bytes]
  234. (hist) ‎Web Portal ‎[1,167 bytes]
  235. (hist) ‎Graduated Security ‎[1,167 bytes]
  236. (hist) ‎Hiring ‎[1,167 bytes]
  237. (hist) ‎Industry Models ‎[1,167 bytes]
  238. (hist) ‎Business Objects ‎[1,172 bytes]
  239. (hist) ‎Balanced Technology Extended (BTX) ‎[1,173 bytes]
  240. (hist) ‎Knowledge Base ‎[1,173 bytes]
  241. (hist) ‎Critical Success Factor (CSF) ‎[1,174 bytes]
  242. (hist) ‎Boundary Value Analysis ‎[1,177 bytes]
  243. (hist) ‎Business Process as a Service (BPaaS) ‎[1,177 bytes]
  244. (hist) ‎Cost Analysis ‎[1,178 bytes]
  245. (hist) ‎CXML (Commerce eXtensible Markup Language) ‎[1,179 bytes]
  246. (hist) ‎Synchromarketing ‎[1,179 bytes]
  247. (hist) ‎Diminishing Marginal Utility ‎[1,180 bytes]
  248. (hist) ‎Synchronous Digital Hierarchy (SDH) ‎[1,182 bytes]
  249. (hist) ‎Value Methodology ‎[1,183 bytes]
  250. (hist) ‎Exit Strategy ‎[1,185 bytes]
  251. (hist) ‎Sub Contractor ‎[1,186 bytes]
  252. (hist) ‎Human Development Theory ‎[1,187 bytes]
  253. (hist) ‎Quality Function Deployment (QFD) ‎[1,187 bytes]
  254. (hist) ‎Attribute-Driven Design Method ‎[1,189 bytes]
  255. (hist) ‎Zero-sum Game ‎[1,189 bytes]
  256. (hist) ‎Organizational Alignment ‎[1,191 bytes]
  257. (hist) ‎Committee of Sponsoring Organizations of the Treadway Commission (COSO) ‎[1,192 bytes]
  258. (hist) ‎Retention Ratio ‎[1,193 bytes]
  259. (hist) ‎Operational Capability ‎[1,193 bytes]
  260. (hist) ‎Building Management Systems (BMS) ‎[1,194 bytes]
  261. (hist) ‎Better Business Case (BBC) ‎[1,195 bytes]
  262. (hist) ‎Digital Asset Management (DAM) ‎[1,195 bytes]
  263. (hist) ‎Collaborative Content Management ‎[1,195 bytes]
  264. (hist) ‎Use Case ‎[1,195 bytes]
  265. (hist) ‎Business Continuity Management (BCM) ‎[1,199 bytes]
  266. (hist) ‎Big Data Maturity Model (BDMM) ‎[1,200 bytes]
  267. (hist) ‎Portability ‎[1,201 bytes]
  268. (hist) ‎Multi Channel Marketing ‎[1,201 bytes]
  269. (hist) ‎Strategic Human Resource Management (SHRM) ‎[1,201 bytes]
  270. (hist) ‎Enterprise Model ‎[1,203 bytes]
  271. (hist) ‎Application Service Management (ASM) ‎[1,204 bytes]
  272. (hist) ‎Terms of Service ‎[1,205 bytes]
  273. (hist) ‎Feng's Classification ‎[1,205 bytes]
  274. (hist) ‎Infrastructure Outsourcing ‎[1,205 bytes]
  275. (hist) ‎Pareto Principle ‎[1,206 bytes]
  276. (hist) ‎Visual Analytics ‎[1,209 bytes]
  277. (hist) ‎Click-Through Rate (CTR) ‎[1,211 bytes]
  278. (hist) ‎Plug-in ‎[1,213 bytes]
  279. (hist) ‎Semantic Web ‎[1,213 bytes]
  280. (hist) ‎Availability Plan ‎[1,215 bytes]
  281. (hist) ‎Business Process Change Cycle ‎[1,217 bytes]
  282. (hist) ‎Schedule Performance Index (SPI) ‎[1,217 bytes]
  283. (hist) ‎User Interface Design (UI) ‎[1,218 bytes]
  284. (hist) ‎Subliminal Advertizing ‎[1,221 bytes]
  285. (hist) ‎Dark Web ‎[1,221 bytes]
  286. (hist) ‎Market Share ‎[1,225 bytes]
  287. (hist) ‎Reliability Block Diagram (RBD) ‎[1,226 bytes]
  288. (hist) ‎Fourier Analysis ‎[1,230 bytes]
  289. (hist) ‎Unstructured Information Management Architecture (UIMA) ‎[1,231 bytes]
  290. (hist) ‎Bandwagon Effect ‎[1,232 bytes]
  291. (hist) ‎Dynamic HTML ‎[1,232 bytes]
  292. (hist) ‎Weighted Micro Function Points (WMFP) ‎[1,233 bytes]
  293. (hist) ‎Systemic Risk ‎[1,233 bytes]
  294. (hist) ‎Atomization ‎[1,235 bytes]
  295. (hist) ‎Privacy Policy ‎[1,235 bytes]
  296. (hist) ‎Network Motif ‎[1,237 bytes]
  297. (hist) ‎Dunning-Kruger Effect ‎[1,237 bytes]
  298. (hist) ‎Compatible Time Sharing System (CTSS) ‎[1,238 bytes]
  299. (hist) ‎Binary File ‎[1,243 bytes]
  300. (hist) ‎Information Asymmetry ‎[1,243 bytes]
  301. (hist) ‎Deliberate Strategy ‎[1,244 bytes]
  302. (hist) ‎System of Record (SOR) ‎[1,246 bytes]
  303. (hist) ‎Value Proposition ‎[1,247 bytes]
  304. (hist) ‎Direct Marketing ‎[1,249 bytes]
  305. (hist) ‎Gartner's Market Share Analysis ‎[1,249 bytes]
  306. (hist) ‎Behavior Learning Engine (BLE) ‎[1,251 bytes]
  307. (hist) ‎Ring Fencing ‎[1,252 bytes]
  308. (hist) ‎Management Information System (MIS) ‎[1,255 bytes]
  309. (hist) ‎Scientific Management Theory ‎[1,258 bytes]
  310. (hist) ‎On-Demand Software ‎[1,262 bytes]
  311. (hist) ‎Supplier Relationship Management ‎[1,262 bytes]
  312. (hist) ‎Abilene Paradox ‎[1,263 bytes]
  313. (hist) ‎Economic Value ‎[1,263 bytes]
  314. (hist) ‎Straw Man Concept ‎[1,263 bytes]
  315. (hist) ‎Platform as a Service (PaaS) ‎[1,265 bytes]
  316. (hist) ‎Quality Management ‎[1,265 bytes]
  317. (hist) ‎Market Driven Organization ‎[1,265 bytes]
  318. (hist) ‎Binary Large Object (BLOB) ‎[1,269 bytes]
  319. (hist) ‎Workers Compensation Insurance ‎[1,269 bytes]
  320. (hist) ‎Value Based Management ‎[1,270 bytes]
  321. (hist) ‎Talent Management ‎[1,270 bytes]
  322. (hist) ‎Transactional Content Management (TCM) ‎[1,270 bytes]
  323. (hist) ‎Substitution Effect ‎[1,271 bytes]
  324. (hist) ‎Web Services Flow Language (WSFL) ‎[1,272 bytes]
  325. (hist) ‎Shareholders' Equity ‎[1,273 bytes]
  326. (hist) ‎Trusted Computer System Evaluation Criteria (TCSEC) ‎[1,274 bytes]
  327. (hist) ‎C-Suite ‎[1,274 bytes]
  328. (hist) ‎Concentrated Marketing ‎[1,275 bytes]
  329. (hist) ‎Large-Scale Integration (LSI) ‎[1,275 bytes]
  330. (hist) ‎Asynchronous JavaScript and XML (AJAX) ‎[1,276 bytes]
  331. (hist) ‎Forced Compliance ‎[1,278 bytes]
  332. (hist) ‎Actual Cost (AC) ‎[1,278 bytes]
  333. (hist) ‎Object Oriented Approach ‎[1,279 bytes]
  334. (hist) ‎Componentization ‎[1,281 bytes]
  335. (hist) ‎Strategic Change Momentum ‎[1,282 bytes]
  336. (hist) ‎Software Development Effort Estimation ‎[1,284 bytes]
  337. (hist) ‎Social Intelligence ‎[1,285 bytes]
  338. (hist) ‎Bankmail Engagement ‎[1,286 bytes]
  339. (hist) ‎User Interface ‎[1,287 bytes]
  340. (hist) ‎Supervisory Control and Data Acquisition (SCADA) ‎[1,288 bytes]
  341. (hist) ‎Internet Protocol (IP) ‎[1,288 bytes]
  342. (hist) ‎Organic Growth ‎[1,289 bytes]
  343. (hist) ‎Code of Ethics ‎[1,291 bytes]
  344. (hist) ‎Behavior Driven Development (BDD) ‎[1,292 bytes]
  345. (hist) ‎World Class Manufacturing ‎[1,294 bytes]
  346. (hist) ‎Strategic Initiatives ‎[1,294 bytes]
  347. (hist) ‎Structure Chart ‎[1,294 bytes]
  348. (hist) ‎Office of Strategy Management ‎[1,297 bytes]
  349. (hist) ‎Synectics ‎[1,297 bytes]
  350. (hist) ‎Application Life Cycle Management Platform as a Service (ALM PaaS) ‎[1,298 bytes]
  351. (hist) ‎Value at Risk ‎[1,299 bytes]
  352. (hist) ‎Cannibalization ‎[1,301 bytes]
  353. (hist) ‎Strategic Architecture ‎[1,301 bytes]
  354. (hist) ‎CMN-GOMS ‎[1,301 bytes]
  355. (hist) ‎Business Rule ‎[1,301 bytes]
  356. (hist) ‎Outcome ‎[1,304 bytes]
  357. (hist) ‎Employee Turnover ‎[1,305 bytes]
  358. (hist) ‎Balance Theory ‎[1,307 bytes]
  359. (hist) ‎Bond Insurance ‎[1,307 bytes]
  360. (hist) ‎Bottom-up Approach ‎[1,307 bytes]
  361. (hist) ‎Pareto Chart ‎[1,307 bytes]
  362. (hist) ‎Reference Semantic Model (RSM) ‎[1,307 bytes]
  363. (hist) ‎Fault Tree Analysis (FTA) ‎[1,308 bytes]
  364. (hist) ‎Probability Theory ‎[1,309 bytes]
  365. (hist) ‎Straight Through Processing (STP) ‎[1,310 bytes]
  366. (hist) ‎Preboot Execution Environment (PXE) ‎[1,311 bytes]
  367. (hist) ‎Distributor ‎[1,314 bytes]
  368. (hist) ‎Social Multi Criteria Analysis (SMCA) ‎[1,314 bytes]
  369. (hist) ‎Structured Data Analysis ‎[1,315 bytes]
  370. (hist) ‎IT Productivity Paradox ‎[1,316 bytes]
  371. (hist) ‎Information Quality Management (IQM) ‎[1,317 bytes]
  372. (hist) ‎Viability Study ‎[1,319 bytes]
  373. (hist) ‎Internet Service Provider (ISP) ‎[1,319 bytes]
  374. (hist) ‎Budgeted Cost of Work Scheduled (BCWS) ‎[1,319 bytes]
  375. (hist) ‎Data Dictionary ‎[1,320 bytes]
  376. (hist) ‎Coaching ‎[1,321 bytes]
  377. (hist) ‎Direct Mail ‎[1,321 bytes]
  378. (hist) ‎Retired Services ‎[1,323 bytes]
  379. (hist) ‎Telemarketing ‎[1,325 bytes]
  380. (hist) ‎Management Buy-Out ‎[1,326 bytes]
  381. (hist) ‎Industry Life Cycle ‎[1,327 bytes]
  382. (hist) ‎Collective Intelligence ‎[1,328 bytes]
  383. (hist) ‎Channel Management ‎[1,330 bytes]
  384. (hist) ‎Service Mark ‎[1,330 bytes]
  385. (hist) ‎Break-even Point ‎[1,331 bytes]
  386. (hist) ‎Profit Motive ‎[1,331 bytes]
  387. (hist) ‎Information Mapping ‎[1,333 bytes]
  388. (hist) ‎Software Visualization ‎[1,333 bytes]
  389. (hist) ‎Design Principles ‎[1,335 bytes]
  390. (hist) ‎Risk Maturity ‎[1,337 bytes]
  391. (hist) ‎Quantitative Investment Analysis ‎[1,337 bytes]
  392. (hist) ‎Strategic Infliction Point ‎[1,337 bytes]
  393. (hist) ‎Security Management ‎[1,337 bytes]
  394. (hist) ‎Cost of Equity ‎[1,338 bytes]
  395. (hist) ‎Financial Services Data Model (FSDM) ‎[1,338 bytes]
  396. (hist) ‎Desktop Operating System ‎[1,339 bytes]
  397. (hist) ‎Executive Information System (EIS) ‎[1,340 bytes]
  398. (hist) ‎Probability Distribution ‎[1,343 bytes]
  399. (hist) ‎Systems Architecture ‎[1,343 bytes]
  400. (hist) ‎Bayes' Theorem ‎[1,344 bytes]
  401. (hist) ‎Software Sizing ‎[1,345 bytes]
  402. (hist) ‎Recurrent Neural Network (RNN) ‎[1,346 bytes]
  403. (hist) ‎Underpinning Contract (UC) ‎[1,347 bytes]
  404. (hist) ‎Simulation Modeling ‎[1,348 bytes]
  405. (hist) ‎Computerized Maintenance Management System (CMMS) ‎[1,349 bytes]
  406. (hist) ‎Enterprise Architecture Life Cycle (EALC) ‎[1,349 bytes]
  407. (hist) ‎Asset Performance Management (APM) ‎[1,350 bytes]
  408. (hist) ‎Health Insurance Portability and Accountability Act (HIPAA) ‎[1,351 bytes]
  409. (hist) ‎Project Dependencies ‎[1,352 bytes]
  410. (hist) ‎Capitalism ‎[1,353 bytes]
  411. (hist) ‎Purchase Order ‎[1,353 bytes]
  412. (hist) ‎Resource Description Framework (RDF) ‎[1,354 bytes]
  413. (hist) ‎Blake and Mouton's Managerial Grid ‎[1,354 bytes]
  414. (hist) ‎Integrative Thinking ‎[1,359 bytes]
  415. (hist) ‎Software Archeology ‎[1,359 bytes]
  416. (hist) ‎Value Creation Index ‎[1,361 bytes]
  417. (hist) ‎Cyberspace ‎[1,361 bytes]
  418. (hist) ‎Strategic Themes ‎[1,362 bytes]
  419. (hist) ‎Data Asset Framework (DAF) ‎[1,363 bytes]
  420. (hist) ‎Brand Line ‎[1,363 bytes]
  421. (hist) ‎Browser Isolation ‎[1,370 bytes]
  422. (hist) ‎Workplace Safety ‎[1,370 bytes]
  423. (hist) ‎Information as a Service (IaaS) ‎[1,371 bytes]
  424. (hist) ‎Stakeholder Engagement ‎[1,371 bytes]
  425. (hist) ‎Operating Expenses ‎[1,373 bytes]
  426. (hist) ‎Brand Reputation ‎[1,373 bytes]
  427. (hist) ‎Cost to Serve (CTS) ‎[1,378 bytes]
  428. (hist) ‎Extensible Authentication Protocol (EAP) ‎[1,379 bytes]
  429. (hist) ‎Formal Organization ‎[1,379 bytes]
  430. (hist) ‎Phishing ‎[1,380 bytes]
  431. (hist) ‎Productive Efficiency ‎[1,381 bytes]
  432. (hist) ‎Marketing Metrics ‎[1,382 bytes]
  433. (hist) ‎Subscription Right ‎[1,382 bytes]
  434. (hist) ‎Payback Period ‎[1,383 bytes]
  435. (hist) ‎CAN-SPAM Act of 2003 ‎[1,384 bytes]
  436. (hist) ‎Dependency Network ‎[1,385 bytes]
  437. (hist) ‎Health Level 7 (HL7) ‎[1,385 bytes]
  438. (hist) ‎Rätselvermehrung ‎[1,385 bytes]
  439. (hist) ‎Organizational Behavior ‎[1,385 bytes]
  440. (hist) ‎Value for Money Audit ‎[1,386 bytes]
  441. (hist) ‎Advanced Distribution Protection and Restoration Devices ‎[1,388 bytes]
  442. (hist) ‎Markup Language ‎[1,388 bytes]
  443. (hist) ‎Autonomous System Number (ASN) ‎[1,391 bytes]
  444. (hist) ‎Value-Based Business-IT Alignment (VITAL) Project ‎[1,394 bytes]
  445. (hist) ‎Strike Price ‎[1,394 bytes]
  446. (hist) ‎Total Shareholder Return (TSR) ‎[1,395 bytes]
  447. (hist) ‎Dempster Shafer (D-S) Theory ‎[1,396 bytes]
  448. (hist) ‎Investor Sentiment ‎[1,397 bytes]
  449. (hist) ‎Crescendo Model of Rejuvenation ‎[1,397 bytes]
  450. (hist) ‎Diminishing Returns (DR) ‎[1,398 bytes]
  451. (hist) ‎SMS Marketing ‎[1,400 bytes]
  452. (hist) ‎Strategic Imperatives ‎[1,401 bytes]
  453. (hist) ‎Support Activities ‎[1,401 bytes]
  454. (hist) ‎Commercial Property Insurance ‎[1,403 bytes]
  455. (hist) ‎Pricing Model ‎[1,404 bytes]
  456. (hist) ‎Infrastructure as a Service (IaaS) ‎[1,405 bytes]
  457. (hist) ‎Social Cost Benefit Analysis (SCBA) ‎[1,405 bytes]
  458. (hist) ‎Cross Training (Business) ‎[1,407 bytes]
  459. (hist) ‎Sunk Cost ‎[1,407 bytes]
  460. (hist) ‎Supply Chain Design ‎[1,407 bytes]
  461. (hist) ‎Information Privacy ‎[1,409 bytes]
  462. (hist) ‎Supply Chain Visibility (SCV) ‎[1,409 bytes]
  463. (hist) ‎Virtual Customer Premises Equipment (vCPE) ‎[1,410 bytes]
  464. (hist) ‎Request for Proposal (RFP) ‎[1,411 bytes]
  465. (hist) ‎Blogging Platform ‎[1,412 bytes]
  466. (hist) ‎Information Flow ‎[1,412 bytes]
  467. (hist) ‎Network Monitoring ‎[1,413 bytes]
  468. (hist) ‎Supplier Evaluation ‎[1,413 bytes]
  469. (hist) ‎National Change of Address (NCOA) ‎[1,415 bytes]
  470. (hist) ‎Business Transaction Protocol (BTP) ‎[1,417 bytes]
  471. (hist) ‎Hedging ‎[1,418 bytes]
  472. (hist) ‎Inventory Shrinkage ‎[1,418 bytes]
  473. (hist) ‎Business Process Simulation ‎[1,420 bytes]
  474. (hist) ‎Open Security Architecture (OSA) Framework ‎[1,420 bytes]
  475. (hist) ‎Document Modeling ‎[1,421 bytes]
  476. (hist) ‎Gantt Chart ‎[1,421 bytes]
  477. (hist) ‎Penetration Pricing ‎[1,421 bytes]
  478. (hist) ‎Cause and Effect Diagram ‎[1,422 bytes]
  479. (hist) ‎Common Alerting Protocol (CAP) ‎[1,422 bytes]
  480. (hist) ‎The Abridged Big Five-Dimensional Circumplex (AB5C) ‎[1,425 bytes]
  481. (hist) ‎Application Control ‎[1,427 bytes]
  482. (hist) ‎Bridging Epistemologies ‎[1,429 bytes]
  483. (hist) ‎Strategic Grid for IT ‎[1,431 bytes]
  484. (hist) ‎Document Object Model (DOM) ‎[1,431 bytes]
  485. (hist) ‎Information Governance Professional (IGP) Certification ‎[1,432 bytes]
  486. (hist) ‎Professional Liability Insurance ‎[1,432 bytes]
  487. (hist) ‎Strategic Synergy ‎[1,432 bytes]
  488. (hist) ‎Intrinsic Stakeholder Commitment ‎[1,434 bytes]
  489. (hist) ‎Six Webs Framework ‎[1,434 bytes]
  490. (hist) ‎Supplier Scorecard ‎[1,435 bytes]
  491. (hist) ‎Crypto Currency ‎[1,436 bytes]
  492. (hist) ‎Play Theory of Mass Communication ‎[1,437 bytes]
  493. (hist) ‎Storage Device ‎[1,438 bytes]
  494. (hist) ‎Primary Customer ‎[1,439 bytes]
  495. (hist) ‎Web Content Management ‎[1,440 bytes]
  496. (hist) ‎Information Model ‎[1,441 bytes]
  497. (hist) ‎Structured Analysis and Design Technique (SADT) ‎[1,442 bytes]
  498. (hist) ‎POSDCORB ‎[1,443 bytes]
  499. (hist) ‎Reverse Logistics ‎[1,444 bytes]
  500. (hist) ‎MoSCoW Method ‎[1,444 bytes]

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)